|
Journal of Zhejiang University SCIENCE C
ISSN 1869-1951(Print), 1869-196x(Online), Monthly
2010 Vol.11 No.3 P.206-213
A secure threshold Paillier proxy signature scheme
Abstract: As e-commerce applications and the underlying public key infrastructure have become more popular over time, many digital mechanisms emulating traditional business activities have been developed and deployed. To build a full-fledged secure digital world, secure implementations of more commercial activity primitives are required. In this paper, we present a secure proxy signature scheme and its threshold version based on the homomorphic Paillier cryptosystem, which can be used in many e-commerce applications such as e-voting, e-bidding/auction, and privacy-preserving data mining. These two schemes are existentially unforgeable against chosen-message attacks and chosen-warrant attacks in the random oracle model. Although it is based on factoring, the threshold Paillier proxy scheme operates without requiring any trusted dealer or combiner. Thus, these two schemes are practical for integration in modularized secure multi-party protocols.
Key words: Paillier proxy signature, Threshold scheme, Secure multi-party protocols, Cryptographic primitives
References:
Open peer comments: Debate/Discuss/Question/Opinion
<1>
DOI:
10.1631/jzus.C0910493
CLC number:
TP309.7
Download Full Text:
Downloaded:
3922
Clicked:
8906
Cited:
1
On-line Access:
2024-08-27
Received:
2023-10-17
Revision Accepted:
2024-05-08
Crosschecked:
2010-01-12